Back to the Spoofit Page

PART I: Simple Spoofing (Non Blind)




1. Short explanation of some words
----------------------------------


This is a short explanation of some words you might see in the
text/source. You probably know all this, but I put it in here anyway.

Sniffit
  My favourite Packet Sniffer, all sniffed sequences in this
  document where created with it. Sniffit can be obtained from:
  http://reptile.rug.ac.be/~coder/sniffit/sniffit.html
  Off course any other decent sniffer will do (but this one wears my
  personal marks and approval).
  (At time of writing a pre-release 0.3.2)

IP-spoofing (further referenced to as spoofing)
  The forging of IP packets
  NOTE that not only IP based protocols are spoofed.
  NOTE that spoofing is also used on a constructive base (LAN spoofing,
       not discussed here).
  NOTE that I don't use it on a constructive base ;)

Non-blind spoofing
  Using the spoofing to interfer with a connection that sends packets
  along your subnet (so generally one of the 2 hosts involved is located
  on your subnet, or all data traffic has to be passing your network
  device,... you might consider taking a job at some transatlantic route
  provider).

Blind spoofing
  Using the spoofing to interfer with a connection (or creating one),
  that does not send packets along your cable.




Brecht Claerhout: coder@succeed.net